CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
5Description
The Total Upkeep - WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.14.9 via the env-info.php and restore-info.json files. This makes it possible for unauthenticated attackers to find the location of back-up files and subsequently download them.
Analysis
The Total Upkeep WordPress backup plugin through version 1.14.9 exposes backup file locations via env-info.php and restore-info.json. Unauthenticated attackers can discover and download complete site backups containing the database, wp-config.php with credentials, and all uploaded files.
Technical Context
The plugin creates env-info.php and restore-info.json files that are accessible without authentication. These files contain the full filesystem path to backup archives. An attacker can use this information to directly download backup ZIP files containing the entire WordPress database (including user credentials), wp-config.php (database passwords, secret keys), and all uploaded media.
Affected Products
['Total Upkeep WordPress Backup <= 1.14.9', 'BoldGrid Backup']
Remediation
Update to Total Upkeep 1.14.10+. Remove env-info.php and restore-info.json from web root. Move backup storage outside the web root. Rotate all credentials (database, secret keys, user passwords).
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2020-30799